Search Results - (( developing a learning algorithm ) OR ( java validation using algorithm ))
Search alternatives:
- learning algorithm »
- validation using »
- java validation »
- using algorithm »
- a learning »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
2
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
3
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
4
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
5
Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof
Published 2019“…In this thesis the research of a self-learning algorithm will be presented, outlined and discussed in detailed manner. …”
Get full text
Get full text
Thesis -
6
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
Get full text
Get full text
Thesis -
7
Development of web based learning content of animation algorithm on searching and sorting techniques / Nur Linda Abdi Nur
Published 2007“…The objectives of this project is to develop self-learning environment in learning searching and sorting algorithm, enhance understanding of student in learning searching and sorting technique and to apply web-based learning in computer science subject, which focus on courses that use searching and sorting algorithm.…”
Get full text
Get full text
Thesis -
8
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Virtual reality in algorithm programming course: practicality and implications for college students
Published 2024“…The product developed is in the form of a VR application that presents learning by having a variety of learning styles. …”
Get full text
Get full text
Get full text
Article -
10
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
11
Ensemble Dual Recursive Learning Algorithms for Identifying Custom Tanks Flow with Leakage
Published 2010“…This paper proposed that, combination of two algorithms into one learning algorithm for predicting mass flow rate of a flow with leakage resulting in a better mass prediction error as compared to a model with single learning algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
12
Ensemble dual recursive learning algorithms for identifying flow with leakage
Published 2010“…This paper proposed that, combination of two algorithms into one learning algorithm for predicting mass flow rate of a flow with leakage resulting in a better mass prediction error compare to a model with single learning algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
13
DESIGN AND DEVELOPMENT OF ANDROID-BASED LEARNING MEDIA FOR LEARNING ALGORITHM AND DATA STRUCTURE
Published 2021“…One of the learning techniques is in the form of algorithms and data structures. …”
Get full text
Get full text
Get full text
Proceeding -
14
Machine learning: tasks, modern day applications and challenges
Published 2019“…Machine learning algorithms learned from available data. Further, this learning laid the foundation to develop AI for the various systems around us. …”
Get full text
Get full text
Get full text
Article -
15
E4ML: Educational Tool for Machine Learning
Published 2003“…There are various types of machine learning algorithms with certain processes taken by the algorithm.In teaching of the machine learning algorithms, such processes need to be explained especially to the beginner in introductory level.This paper discusses the development the tool that addresses the process by certain algorithm to produce a hypothesis or output based on given data.This tool can also be used in teaching and learning purposes.The explanation of processes by the algorithms is demonstrated through simple simulation.The source of the algorithms was adapted from Mitchell book [1] that cover popular algorithms in machine learning for teaching and learning such as Concept Learning, Decision Tree, Bayesian Learning, Neural Networks, and Instance based Learning.The tool also used several classes of Weka (Waikato Environment for Knowledge Analysis) as a basis for the design and implementation of the new tool that focuses on explaining the processes taken by certain algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
16
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item -
17
Clustering ensemble learning method based on incremental genetic algorithms
Published 2012“…In the first and second phases, a threshold fuzzy c-means clustering algorithm as a clusterer and a pattern ensemble learning method based on the incremental genetic-based algorithms are proposed respectively. …”
Get full text
Get full text
Thesis -
18
An interactive analytics approach for sustainable and resilient case studies: a machine learning perspective
Published 2023“…To integrate machine learning and human interactions, this paper develops a new three-stage interactive algorithm in business analytics, called the interactive Nautilus-based algorithm, to address complex problems. …”
Get full text
Get full text
Article -
19
Development of Machine Learning Algorithm for Acquiring Machining Data in Turning Process
Published 2004“…The design network is trained by presenting several target machining data that the network must learn according to a learning rule (algorithm). …”
Get full text
Get full text
Thesis -
20
Meta-Heuristic Algorithms for Learning Path Recommender at MOOC
Published 2021“…The learners usually ask the necessary skills that they expect to earn (query). The need is to develop a recommender system that can search for suitable learning paths. …”
Get full text
Get full text
Article
